Re-imagining Vivaldi with HTML5/WebGL. PhD Candidate: Djuro Mirkovic Supervisors: Prof. Grenville Armitage and Dr. Philip Branch

Size: px
Start display at page:

Download "Re-imagining Vivaldi with HTML5/WebGL. PhD Candidate: Djuro Mirkovic Supervisors: Prof. Grenville Armitage and Dr. Philip Branch"

Transcription

1 Re-imagining Vivaldi with HTML5/WebGL PhD Candidate: Djuro Mirkovic Supervisors: Prof. Grenville Armitage and Dr. Philip Branch Centre for Advanced Internet Architectures (CAIA) Swinburne University of Technology Outline Problem Scenario Motivation Goal Network Coordinate System (NCS) Model Space Vivaldi Discussion and Examples Demo Summary 15 October

2 Problem Scenario Client wants to select a Server with the lowest round trip time (RTT) Measure RTT with all Servers? Wastes resources (eg. Bandwidth) May overflow NAT Table poor performance May take a long time to gather all RTT measurements After time t, RTT measurements are stale dmirkovic@swin.edu.au 15 October Motivation Peer-to-peer (P2P) applications treat the Internet as a black box Client-Server model optimal selection can be improved Scenarios: Network Coordinate System (NCS) with large number of nodes or small data size can improve performance and resource allocation dmirkovic@swin.edu.au 15 October

3 Goal A model that is able to predict the distance between two Nodes, given only a few measurements. dmirkovic@swin.edu.au 15 October Network Coordinate Systems (NCS) Centralised Predict using Synthetic Coordinates as described in Global Network Positioning (GNP) [1] Requires Landmark(s) (most likely being Server Nodes or accurate Nodes) Decentralised Predict using Network Coordinate System as described in Vivaldi [2] Landmark(s) are optional [1] - [2] dmirkovic@swin.edu.au 15 October

4 Model Space N-dimension Euclidean Model At least 2D Model is required Increasing N-dimensions substantially in Euclidean Model does not have significant improvements May have an opposite undesired effect increasing the computational power required for higher N-dimensions Using a 3D to 5D Model is adequate 2D + Height Vector Model Spherical Model Cylindrical Model dmirkovic@swin.edu.au 15 October Decentralised - Vivaldi Vivaldi is solving a simultaneous equation distributed in time and space Nodes iteratively update their own coordinates based on current network state A Local Node that is communicating with Remote Node(s) requires a very small sample of Remote Node(s) to get an overall state Nodes communicating can piggyback on existing application traffic Adds very little overhead dmirkovic@swin.edu.au 15 October

5 Springs Overestimate and Underestimate RTT Difference between measured and calculated RTT Springs compress and stretch to move Node D to new coordinate space after n iterations of Vivaldi Push and Pull effect (Hooke s Law) dmirkovic@swin.edu.au 15 October Triangle Inequality NCS assumption is that Triangle Inequality holds for Node paths. The sum of the lengths of any two sides, must be greater than or equal to the length of remaining side. [1] Eg. bc ab + ac [1] - dmirkovic@swin.edu.au 15 October

6 Vivaldi Example 1 (Step 1) Local Node A will do sequence of communication with other Remote Nodes (B and C) dmirkovic@swin.edu.au 15 October Vivaldi Example 1 (Step 2) A receives B s Coordinates (-20, 15) and RTT (30ms) A calculates distance to B (50ms) RTT A, B = (A x B x ) 2 +(A y B y ) 2 RTT A, B = (A x B x ) 2 +(A y B y ) 2 dmirkovic@swin.edu.au 15 October

7 Vivaldi Example 1 (Step 3) Overestimated: A needs to be pulled towards B dmirkovic@swin.edu.au 15 October Vivaldi Example 1 (Step 4) A (over n-iterations not instantly!) approaches B s measured RTT. A adjusts coordinates (A x, A y ) dmirkovic@swin.edu.au 15 October

8 Vivaldi Example 1 (Step 5) A communicates with C Note: coordinate position of A has been moved (when A completed one iteration of Vivaldi with B) dmirkovic@swin.edu.au 15 October Vivaldi Example 1 (Step 6) A receives C s Coordinates (50, -25) and RTT (40ms) A calculates distance to C (20ms) RTT A, B = (A x B x ) 2 +(A y B y ) 2 dmirkovic@swin.edu.au 15 October

9 Vivaldi Example 1 (Step 7) Underestimated: A needs to be pushed away from C dmirkovic@swin.edu.au 15 October Vivaldi Example 1 (Step 8) A (over n-iterations) approaches C s measured RTT. A adjusts coordinates (A x, A y ) dmirkovic@swin.edu.au 15 October

10 Vivaldi Example 1 (Step 9) Previous slide, the distance between A and B now would be wrong Vivaldi process will iterate until all Local and Remote Nodes measured RTT have same calculated distance (or RTT) dmirkovic@swin.edu.au 15 October Vivaldi Landmarks Example 2 (Step 1) 13 Stable Landmark Nodes (A to M) calculated their coordinates (over n-iterations). New Node N joins the process dmirkovic@swin.edu.au 15 October

11 Vivaldi Landmarks Example 2 (Step 2) 2D Euclidean Model requires at least 3 Remote Node samples, otherwise many solutions may exist in NCS Number of Remote Node samples is equal to number of dimensions + 1 (3D would need 4, 4D would need 5, etc) N needs 3 Remote Node samples: Does N select 3 random? Does N select more than 3 random? If Landmarks used: Does N select 3 shortest RTT measured? Does N select 3 longest RTT measured? Does N select 3 different geographical locations? dmirkovic@swin.edu.au 15 October Vivaldi Landmarks Example 2 (Step 3) N randomly selected Remote Nodes (E, F, and M). Measured RTT from E, F, and M are 200ms, 150ms, and 30ms respectively dmirkovic@swin.edu.au 15 October

12 Vivaldi Landmarks Example 2 (Step 4) N after n-iterations of Vivaldi determines coordinates and satisfies the computed RTT to be the same as measured RTT dmirkovic@swin.edu.au 15 October Vivaldi Landmarks Example 2 (Step 5) RTT between N and Remote Nodes (A, B, C, D, G, H, I, J, K, and L) can be predicted by the Euclidean Distance between their coordinates without direct measurement dmirkovic@swin.edu.au 15 October

13 Vivaldi Landmarks Example 2 (Step 6) N best option is C (25ms) N calculates the predicted RTT for A, B, C, D, G, H, I, J, K, and L faster than it takes to measure the RTT for each Remote Node Previous scenario had only 13 Remote Nodes, what if we had a large number of Remote Nodes (10,000, 100,000, 1 million, etc)? dmirkovic@swin.edu.au 15 October Vivaldi space rotation Each Node in the Vivaldi process starts at the origin, and obtains a random starting position Vivaldi with different seeds (varying random starting position) using the same experimental data, an interesting observation is that: the overall stable position in NCS in one seed universe becomes nearly like a rotation in the second seed universe dmirkovic@swin.edu.au 15 October

14 Vivaldi Caveats Triangle Inequality violations Malicious Nodes can affect the calculated coordinates 15 October Demo of 3D Vivaldi Simulations Hard to conceptualise the overall Vivaldi process without a suitable simulation tool dmirkovic@swin.edu.au 15 October

15 Summary Vivaldi is a decentralised NCS 3D 5D Euclidean Model is an acceptable model to use in NCS Vivaldi can optimise application performance and resource allocation dmirkovic@swin.edu.au 15 October Acknowledgement Thank you very much to Prof. Grenville Armitage and Dr. Philip Branch for their supervision support throughout my PhD. dmirkovic@swin.edu.au 15 October

16 Questions? 15 October

Vivaldi Practical, Distributed Internet Coordinates

Vivaldi Practical, Distributed Internet Coordinates Vivaldi Practical, Distributed Internet Coordinates Frank Dabek Russ Cox Robert Morris Frans Kaashoek Computer Science and Artificial Intelligence Lab Massachusetts Institute of Technology ACM SIGCOMM

More information

Vivaldi: : A Decentralized Network Coordinate System

Vivaldi: : A Decentralized Network Coordinate System Vivaldi: : A Decentralized Network Coordinate System Frank Dabek, Russ Cox, Frans Kaashoek, Robert Morris MIT CSAIL Presenter: Yi-Chao Chen 1 Introduction Design Issues Idea Algorithm Evaluation Model

More information

Vivaldi: A Decentralized Network Coordinate System. Authors: Frank Dabek, Russ Cox, Frans Kaashoek, Robert Morris MIT. Published at SIGCOMM 04

Vivaldi: A Decentralized Network Coordinate System. Authors: Frank Dabek, Russ Cox, Frans Kaashoek, Robert Morris MIT. Published at SIGCOMM 04 Vivaldi: A Decentralized Network Coordinate System Authors: Frank Dabek, Russ Cox, Frans Kaashoek, Robert Morris MIT Published at SIGCOMM 04 Presented by: Emmanouel Kyriakakis Key tool: Synthetic Coordinates

More information

Vivaldi Practical, Distributed Internet Coordinates

Vivaldi Practical, Distributed Internet Coordinates Vivaldi Practical, Distributed Internet Coordinates Russ Cox, Frank Dabek, Frans Kaashoek, Robert Morris, and many others rsc@mit.edu Computer Science and Artificial Intelligence Lab Massachusetts Institute

More information

Vivaldi: A Decentralized Coordinate System

Vivaldi: A Decentralized Coordinate System Vivaldi: A Decentralized Coordinate System Frank Dabek, Russ Cox, Frans Kaashoek and Robert Morris ACM SIGCOMM Computer Communication Review. Vol.. No.. ACM, 00. Presenter: Andrew and Yibo Peer-to-Peer

More information

Building Large-scale Distributed Systems with Network Coordinates

Building Large-scale Distributed Systems with Network Coordinates Distributed Software Engineering (DSE) Group Department of Computing Building Large-scale Distributed Systems with Network Coordinates Peter Pietzuch prp@doc.ic.ac.uk Distributed Software Engineering (DSE)

More information

Automated Traffic Classification and Application Identification using Machine Learning. Sebastian Zander, Thuy Nguyen, Grenville Armitage

Automated Traffic Classification and Application Identification using Machine Learning. Sebastian Zander, Thuy Nguyen, Grenville Armitage Automated Traffic Classification and Application Identification using Machine Learning Sebastian Zander, Thuy Nguyen, Grenville Armitage {szander,tnguyen,garmitage}@swin.edu.au Centre for Advanced Internet

More information

Internet Coordinate Systems Tutorial

Internet Coordinate Systems Tutorial Internet Coordinate Systems Tutorial Marcelo Pias marcelo.pias@cl.cam.ac.uk Outline Motivation Problem statement General Approach Techniques Global Network Positioning (GNP) Practical Internet Coordinates

More information

CAIA Realtime VoIP Classification and Redirection Djuro Mirkovic.

CAIA Realtime VoIP Classification and Redirection Djuro Mirkovic. CAIA Realtime VoIP Classification and Redirection Djuro Mirkovic 7185863@student.swin.edu.au Centre for Advanced Internet Architectures (CAIA) Swinburne University of Technology Outline Multiple Access

More information

Network Coordinates in the Wild

Network Coordinates in the Wild Network Coordinates in the Wild Jonathan Ledlie Margo Seltzer Paul Gardner Harvard University Aelitis / Azureus Hourglass Project http://www.eecs.harvard.edu/~syrah/hourglass Jonathan Ledlie - Harvard

More information

BGP Anomaly Detection. Bahaa Al-Musawi PhD candidate Supervisors: Dr. Philip Branch and Prof. Grenville Armitage.

BGP Anomaly Detection. Bahaa Al-Musawi PhD candidate Supervisors: Dr. Philip Branch and Prof. Grenville Armitage. BGP Anomaly Detection Bahaa Al-Musawi PhD candidate Supervisors: Dr. Philip Branch and Prof. Grenville Armitage balmusawi@swin.edu.au Centre for Advanced Internet Architectures (CAIA) Swinburne University

More information

CSC D70: Compiler Optimization Register Allocation

CSC D70: Compiler Optimization Register Allocation CSC D70: Compiler Optimization Register Allocation Prof. Gennady Pekhimenko University of Toronto Winter 2018 The content of this lecture is adapted from the lectures of Todd Mowry and Phillip Gibbons

More information

Vivaldi: A Decentralized Network Coordinate System

Vivaldi: A Decentralized Network Coordinate System Vivaldi: A Decentralized Network Coordinate System Xintong Wang, Han Zhang EECS 589 Paper Review 1 Full Reference Authors: Frank Dabek, Russ Cox, Frans Kaashoek and Robert Morris. Title: Vivaldi: A Decentralized

More information

Charm: A charming network coordinate system

Charm: A charming network coordinate system Charm: A charming network coordinate system Çağatay Demiralp December 5, 27 Abstract We present a new network coordinate system, Charm, embedding round-trip time latencies into the Euclidean space. Charm

More information

Bittorrent traffic classification

Bittorrent traffic classification Bittorrent traffic classification Tung M Le 1, Jason But Centre for Advanced Internet Architectures. Technical Report 091022A Swinburne University of Technology Melbourne, Australia jbut@swin.edu.au Abstract-

More information

Coordinate-based Routing:

Coordinate-based Routing: Coordinate-based Routing: Refining NodeIds in Fabian Hartmann and Bernhard Heep P2PNet 09 (in conjunction with ICUMT 09) St. Petersburg, Russia Motivation Structured P2P overlays offering key-based routing

More information

A Clustering Approach to the Bounded Diameter Minimum Spanning Tree Problem Using Ants. Outline. Tyler Derr. Thesis Adviser: Dr. Thang N.

A Clustering Approach to the Bounded Diameter Minimum Spanning Tree Problem Using Ants. Outline. Tyler Derr. Thesis Adviser: Dr. Thang N. A Clustering Approach to the Bounded Diameter Minimum Spanning Tree Problem Using Ants Tyler Derr Thesis Adviser: Dr. Thang N. Bui Department of Math & Computer Science Penn State Harrisburg Spring 2015

More information

PlanetLab Deployment, Comparison and Analysis of Network Coordinate Systems

PlanetLab Deployment, Comparison and Analysis of Network Coordinate Systems PlanetLab Deployment, Comparison and Analysis of Network Coordinate Systems Fenglin Liao, Keshava P Subramanya, Veljko Pejovic, Ben Zhao {fenglin, keshava, veljko, ravenben} @ cs.ucsb.edu Abstract - In

More information

Vivaldi: A Decentralized Network Coordinate System

Vivaldi: A Decentralized Network Coordinate System Vivaldi: A Decentralized Network Coordinate System Frank Dabek, Russ Cox, Frans Kaashoek, Robert Morris MIT CSAIL Cambridge, MA fdabek,rsc,kaashoek,rtm@mit.edu ABSTRACT Large-scale Internet applications

More information

Skeleton-Based Shape Deformation using Simplex Transformations

Skeleton-Based Shape Deformation using Simplex Transformations Computer Graphics International 2006 Skeleton-Based Shape Deformation using Simplex Transformations Han-Bing Yan, Shi-Min Hu and Ralph Martin Outline Motivation Introduction Mesh segmentation using skeleton

More information

Veracity: Practical Secure Network Coordinates via Vote-Based Agreements

Veracity: Practical Secure Network Coordinates via Vote-Based Agreements Veracity: Practical Secure Network Coordinates via Vote-Based Agreements Micah Sherr, Matt Blaze, and Boon Thau Loo University of Pennsylvania USENIX Technical June 18th, 2009 1 Network Coordinate Systems

More information

Section The Law of Sines and the Law of Cosines

Section The Law of Sines and the Law of Cosines Section 7.3 - The Law of Sines and the Law of Cosines Sometimes you will need to solve a triangle that is not a right triangle. This type of triangle is called an oblique triangle. To solve an oblique

More information

1-8 Exploring Transformations

1-8 Exploring Transformations 1-8 Exploring Transformations Warm Up Lesson Presentation Lesson Quiz 2 Warm Up Plot each point. D 1. A(0,0) 2. B(5,0) 3. C( 5,0) 4. D(0,5) 5. E(0, 5) 6. F( 5, 5) C A F E B Objectives Apply transformations

More information

Towards Optimal Data Replication Across Data Centers

Towards Optimal Data Replication Across Data Centers Towards Optimal Data Replication Across Data Centers Fan Ping, Xiaohu Li, Christopher McConnell, Rohini Vabbalareddy, Jeong-Hyon Hwang Department of Computer Science University at Albany - SUNY {apping,

More information

<Outline> Mathematical Training Program for Laotian Teachers

<Outline> Mathematical Training Program for Laotian Teachers Mathematical Training Program for Laotian Teachers Euclidean Geometry Analytic Geometry Trigonometry Dr Wattana Toutip Department of Mathematics Faculty of Science Khon Kaen University February

More information

Objectives. Vocabulary. 1-1 Exploring Transformations

Objectives. Vocabulary. 1-1 Exploring Transformations Warm Up Plot each point. D Warm Up Lesson Presentation Lesson Quiz 1. A(0,0) 2. B(5,0) 3. C( 5,0) 4. D(0,5) C A B 5. E(0, 5) 6. F( 5, 5) F E Algebra 2 Objectives Apply transformations to points and sets

More information

Define the red- black tree properties Describe and implement rotations Implement red- black tree insertion

Define the red- black tree properties Describe and implement rotations Implement red- black tree insertion Red black trees Define the red- black tree properties Describe and implement rotations Implement red- black tree insertion We will skip red- black tree deletion October 2004 John Edgar 2 Items can be inserted

More information

You ll use the six trigonometric functions of an angle to do this. In some cases, you will be able to use properties of the = 46

You ll use the six trigonometric functions of an angle to do this. In some cases, you will be able to use properties of the = 46 Math 1330 Section 6.2 Section 7.1: Right-Triangle Applications In this section, we ll solve right triangles. In some problems you will be asked to find one or two specific pieces of information, but often

More information

a) A(5,7) and B(3,9) b) E( 1, 4) and F( 2,8) 2) find the equation of the line, in the form y=mx+b, that goes through the points: y = mx + b

a) A(5,7) and B(3,9) b) E( 1, 4) and F( 2,8) 2) find the equation of the line, in the form y=mx+b, that goes through the points: y = mx + b .1 medians DO IT NOW.1 Median of a Triangle 1) Determine the coordinates of the midpoint of the line segment defined by each pair of endpoints: a) A(5,7) and B(3,9) b) E( 1, 4) and F(,8) ) find the equation

More information

A Synthetic Traffic Model for Half-Life

A Synthetic Traffic Model for Half-Life A Synthetic Traffic Model for Half-Life Tanja Lang, Grenville Armitage, Phillip Branch, Hwan-Yi Choo Centre for Advanced Internet Architectures Swinburne University of Technology Melbourne, Australia tlang@swin.edu.au,

More information

The same procedure is used for the other factors.

The same procedure is used for the other factors. When DOE Wisdom software is opened for a new experiment, only two folders appear; the message log folder and the design folder. The message log folder includes any error message information that occurs

More information

CONTENT-DISTRIBUTION NETWORKS

CONTENT-DISTRIBUTION NETWORKS CONTENT-DISTRIBUTION NETWORKS George Porter June 1, 2018 ATTRIBUTION These slides are released under an Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0) Creative Commons license These

More information

[Note: each line drawn must be a single line segment satisfying x = 3] (b) y = x drawn 1 B1 for y = x drawn

[Note: each line drawn must be a single line segment satisfying x = 3] (b) y = x drawn 1 B1 for y = x drawn 1. (a) x = 3 drawn 1 B1 for x = 3 drawn (b) y = x drawn 1 B1 for y = x drawn [Note: each line drawn must be a single line segment satisfying x = 3] [Note: each line drawn must be a single line segment

More information

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

PASS4TEST. IT Certification Guaranteed, The Easy Way!  We offer free update service for one year PASS4TEST IT Certification Guaranteed, The Easy Way! \ We offer free update service for one year Exam : TB0-121 Title : TIBCO ActiveMatrix BPM Solution Designer Vendors : Tibco Version : DEMO Get Latest

More information

Episode 5. Scheduling and Traffic Management

Episode 5. Scheduling and Traffic Management Episode 5. Scheduling and Traffic Management Part 2 Baochun Li Department of Electrical and Computer Engineering University of Toronto Keshav Chapter 9.1, 9.2, 9.3, 9.4, 9.5.1, 13.3.4 ECE 1771: Quality

More information

CCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4

CCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4 CCNA Exploration Network Fundamentals Chapter 06 Addressing the Network IPv4 Updated: 20/05/2008 1 6.0.1 Introduction Addressing is a key function of Network layer protocols that enables data communication

More information

Red-Black-Trees and Heaps in Timestamp-Adjusting Sweepline Based Algorithms

Red-Black-Trees and Heaps in Timestamp-Adjusting Sweepline Based Algorithms Department of Informatics, University of Zürich Vertiefungsarbeit Red-Black-Trees and Heaps in Timestamp-Adjusting Sweepline Based Algorithms Mirko Richter Matrikelnummer: 12-917-175 Email: mirko.richter@uzh.ch

More information

CSE 124: CONTENT-DISTRIBUTION NETWORKS. George Porter December 4, 2017

CSE 124: CONTENT-DISTRIBUTION NETWORKS. George Porter December 4, 2017 CSE 124: CONTENT-DISTRIBUTION NETWORKS George Porter December 4, 2017 ATTRIBUTION These slides are released under an Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0) Creative Commons

More information

CS419: Computer Networks. Lecture 10, Part 3: Apr 13, 2005 Transport: TCP performance

CS419: Computer Networks. Lecture 10, Part 3: Apr 13, 2005 Transport: TCP performance : Computer Networks Lecture 10, Part 3: Apr 13, 2005 Transport: TCP performance TCP performance We ve seen how TCP the protocol works But there are a lot of tricks required to make it work well Indeed,

More information

Algorithms for Bioinformatics

Algorithms for Bioinformatics Adapted from slides by Leena Salmena and Veli Mäkinen, which are partly from http: //bix.ucsd.edu/bioalgorithms/slides.php. 582670 Algorithms for Bioinformatics Lecture 6: Distance based clustering and

More information

Near Neighbor Search in High Dimensional Data (1) Dr. Anwar Alhenshiri

Near Neighbor Search in High Dimensional Data (1) Dr. Anwar Alhenshiri Near Neighbor Search in High Dimensional Data (1) Dr. Anwar Alhenshiri Scene Completion Problem The Bare Data Approach High Dimensional Data Many real-world problems Web Search and Text Mining Billions

More information

Parallel Lines Investigation

Parallel Lines Investigation Year 9 - The Maths Knowledge Autumn 1 (x, y) Along the corridor, up the stairs (3,1) x = 3 Gradient (-5,-2) (0,0) y-intercept Vertical lines are always x = y = 6 Horizontal lines are always y = Parallel

More information

? Answer:

? Answer: A1 What is the value of 1 2 + 2 3 + 3 4 + 4 5 5 2? A2 What is the value of k? 11 2 22 2 33 2 = 66 2 k. A3 The four-digit integers 5634 and 6435 share the following two properties: (i) they consist of four

More information

Recap A Search Optimality of A. Search: A. CPSC 322 Search 5. Textbook 3.6. Search: A CPSC 322 Search 5, Slide 1

Recap A Search Optimality of A. Search: A. CPSC 322 Search 5. Textbook 3.6. Search: A CPSC 322 Search 5, Slide 1 Search: A CPSC 322 Search 5 Textbook 3.6 Search: A CPSC 322 Search 5, Slide 1 Lecture Overview 1 Recap 2 A Search 3 Optimality of A Search: A CPSC 322 Search 5, Slide 2 Search with Costs Sometimes there

More information

The Pythagorean Theorem: For a right triangle, the sum of the two leg lengths squared is equal to the length of the hypotenuse squared.

The Pythagorean Theorem: For a right triangle, the sum of the two leg lengths squared is equal to the length of the hypotenuse squared. Math 1 TOOLKITS TOOLKIT: Pythagorean Theorem & Its Converse The Pythagorean Theorem: For a right triangle, the sum of the two leg lengths squared is equal to the length of the hypotenuse squared. a 2 +

More information

5/27/12. Objectives 7.1. Area of a Region Between Two Curves. Find the area of a region between two curves using integration.

5/27/12. Objectives 7.1. Area of a Region Between Two Curves. Find the area of a region between two curves using integration. Objectives 7.1 Find the area of a region between two curves using integration. Find the area of a region between intersecting curves using integration. Describe integration as an accumulation process.

More information

Navigation and Metric Path Planning

Navigation and Metric Path Planning Navigation and Metric Path Planning October 4, 2011 Minerva tour guide robot (CMU): Gave tours in Smithsonian s National Museum of History Example of Minerva s occupancy map used for navigation Objectives

More information

Puzzle page. Mathematical Misfits three dimensional. Dual polygons. Puzzle page

Puzzle page. Mathematical Misfits three dimensional. Dual polygons. Puzzle page 1997 2009, Millennium Mathematics Project, University of Cambridge. Permission is granted to print and copy this page on paper for non commercial use. For other uses, including electronic redistribution,

More information

Secure and Accurate Network Coordinate Systems

Secure and Accurate Network Coordinate Systems Secure and Accurate Network Coordinate Systems A DISSERTATION SUBMITTED TO THE FACULTY OF THE GRADUATE SCHOOL OF THE UNIVERSITY OF MINNESOTA BY D. Eric Chan-Tin IN PARTIAL FULFILLMENT OF THE REQUIREMENTS

More information

A Cost-Space Approach to Distributed Query Optimization in Stream Based Overlays

A Cost-Space Approach to Distributed Query Optimization in Stream Based Overlays A Cost-Space Approach to Distributed Query Optimization in Stream Based Overlays Jeffrey Shneidman, Peter Pietzuch, Matt Welsh, Margo Seltzer, Mema Roussopoulos Systems Research Group Harvard University

More information

Greedy Routing by Network Distance Embedding

Greedy Routing by Network Distance Embedding IEEE/ACM TRANSACTIONS ON NETWORKING, VOL., NO., MON YEAR Greedy Routing by Network Distance Embedding Chen Qian, Member, IEEE, Member, ACM and Simon S. Lam, Fellow, IEEE, Fellow, ACM Abstract Greedy routing

More information

Authors: Rupa Krishnan, Harsha V. Madhyastha, Sridhar Srinivasan, Sushant Jain, Arvind Krishnamurthy, Thomas Anderson, Jie Gao

Authors: Rupa Krishnan, Harsha V. Madhyastha, Sridhar Srinivasan, Sushant Jain, Arvind Krishnamurthy, Thomas Anderson, Jie Gao Title: Moving Beyond End-to-End Path Information to Optimize CDN Performance Authors: Rupa Krishnan, Harsha V. Madhyastha, Sridhar Srinivasan, Sushant Jain, Arvind Krishnamurthy, Thomas Anderson, Jie Gao

More information

You ll use the six trigonometric functions of an angle to do this. In some cases, you will be able to use properties of the = 46

You ll use the six trigonometric functions of an angle to do this. In some cases, you will be able to use properties of the = 46 Math 1330 Section 6.2 Section 7.1: Right-Triangle Applications In this section, we ll solve right triangles. In some problems you will be asked to find one or two specific pieces of information, but often

More information

Triangulation: A new algorithm for Inverse Kinematics

Triangulation: A new algorithm for Inverse Kinematics Triangulation: A new algorithm for Inverse Kinematics R. Müller-Cajar 1, R. Mukundan 1, 1 University of Canterbury, Dept. Computer Science & Software Engineering. Email: rdc32@student.canterbury.ac.nz

More information

Pharos: A Decentralized and Hierarchical Network Coordinate System for Internet Distance Prediction

Pharos: A Decentralized and Hierarchical Network Coordinate System for Internet Distance Prediction : A Decentralized and Hierarchical Network Coordinate System for Internet Distance Prediction Yang Chen, Yongqiang Xiong, Xiaohui Shi, Beixing Deng,XingLi Department of Electronic Engineering, Tsinghua

More information

Year Long Mathematics Plan Fourth Grade First Quarter: Discovering Patterns and Relationships (~5 weeks)

Year Long Mathematics Plan Fourth Grade First Quarter: Discovering Patterns and Relationships (~5 weeks) Year Long Mathematics Plan Fourth Grade First Quarter: Discovering Patterns and Relationships (~5 weeks) *Concepts covered: patterns, relationships, T-tables, and graphs. *Critical Content: comparing,

More information

DCRoute: Speeding up Inter-Datacenter Traffic Allocation while Guaranteeing Deadlines

DCRoute: Speeding up Inter-Datacenter Traffic Allocation while Guaranteeing Deadlines DCRoute: Speeding up Inter-Datacenter Traffic Allocation while Guaranteeing Deadlines Mohammad Noormohammadpour, Cauligi S. Raghavendra Ming Hsieh Department of Electrical Engineering University of Southern

More information

Informed search. Soleymani. CE417: Introduction to Artificial Intelligence Sharif University of Technology Spring 2016

Informed search. Soleymani. CE417: Introduction to Artificial Intelligence Sharif University of Technology Spring 2016 Informed search CE417: Introduction to Artificial Intelligence Sharif University of Technology Spring 2016 Soleymani Artificial Intelligence: A Modern Approach, Chapter 3 Outline Best-first search Greedy

More information

Review of Sine, Cosine, and Tangent for Right Triangle

Review of Sine, Cosine, and Tangent for Right Triangle Review of Sine, Cosine, and Tangent for Right Triangle In trigonometry problems, all vertices (corners or angles) of the triangle are labeled with capital letters. The right angle is usually labeled C.

More information

Experimental Study on Neighbor Selection Policy for Phoenix Network Coordinate System

Experimental Study on Neighbor Selection Policy for Phoenix Network Coordinate System Experimental Study on Neighbor Selection Policy for Phoenix Network Coordinate System Gang Wang, Shining Wu, Guodong Wang, Beixing Deng, Xing Li Tsinghua National Laboratory for Information Science and

More information

CS268: Beyond TCP Congestion Control

CS268: Beyond TCP Congestion Control TCP Problems CS68: Beyond TCP Congestion Control Ion Stoica February 9, 004 When TCP congestion control was originally designed in 1988: - Key applications: FTP, E-mail - Maximum link bandwidth: 10Mb/s

More information

Today s s lecture. Lecture 3: Search - 2. Problem Solving by Search. Agent vs. Conventional AI View. Victor R. Lesser. CMPSCI 683 Fall 2004

Today s s lecture. Lecture 3: Search - 2. Problem Solving by Search. Agent vs. Conventional AI View. Victor R. Lesser. CMPSCI 683 Fall 2004 Today s s lecture Search and Agents Material at the end of last lecture Lecture 3: Search - 2 Victor R. Lesser CMPSCI 683 Fall 2004 Continuation of Simple Search The use of background knowledge to accelerate

More information

Switching and Forwarding

Switching and Forwarding Switching and Forwarding Outline Store-and-Forward Switches Bridges and Extended LANs Spring 7 CSE64 Switch Switching protocol T T STS- Spring 7 CSE64 Scalable Networks Switch forwards packets from input

More information

BGP Path Exploration Damping (PED)

BGP Path Exploration Damping (PED) BGP Path Exploration Damping (PED) Mattia Rossi mrossi@swin.edu.au Centre for Advanced Internet Architectures (CAIA) Swinburne University of Technology Outline Introduction Motivation Path Exploration

More information

CHAPTER 4 K-MEANS AND UCAM CLUSTERING ALGORITHM

CHAPTER 4 K-MEANS AND UCAM CLUSTERING ALGORITHM CHAPTER 4 K-MEANS AND UCAM CLUSTERING 4.1 Introduction ALGORITHM Clustering has been used in a number of applications such as engineering, biology, medicine and data mining. The most popular clustering

More information

Inverters with Capacitive Output Impedance (C-inverters)

Inverters with Capacitive Output Impedance (C-inverters) Inverters with Capacitive Output Impedance (C-inverters) Yu Zeng Supervisor: Prof. Qing-Chang Zhong Department of Automatic Control and System Engineering The University of Sheffield UKACC PhD Presentation

More information

Multimedia-unfriendly TCP Congestion Control and Home Gateway Queue Management

Multimedia-unfriendly TCP Congestion Control and Home Gateway Queue Management Multimedia-unfriendly TCP Congestion Control and Home Gateway Queue Management Lawrence Stewart α, David Hayes α, Grenville Armitage α, Michael Welzl β, Andreas Petlund β α Centre for Advanced Internet

More information

6.2 Volumes by Disks, Washers, and Cross-Sections

6.2 Volumes by Disks, Washers, and Cross-Sections 6.2 Volumes by Disks, Washers, and Cross-Sections General Principle: Disks Take slices PERPENDICULAR to axis of rotation and rotate around that axis. About x-axis: About y-axis: 1 Examples: Set up integrals

More information

Temporally Adaptive A* Algorithm on Time Dependent Transportation Network

Temporally Adaptive A* Algorithm on Time Dependent Transportation Network Temporally Adaptive A* Algorithm on Time Dependent Transportation Network Nianbo Zheng, Feng Lu Institute of Geographic Sciences and Natural Resources Research Chinese Academy of Sciences Beijing, 100101,

More information

Cloth Hair. and. soft bodies

Cloth Hair. and. soft bodies Cloth Hair Lesson 11 and soft bodies Lesson 08 Outline Problem definition and motivations Modeling deformable solids with mass-spring model Position based dynamics Modeling cloths with mass-spring model

More information

Chapter 11: Indexing and Hashing

Chapter 11: Indexing and Hashing Chapter 11: Indexing and Hashing Basic Concepts Ordered Indices B + -Tree Index Files B-Tree Index Files Static Hashing Dynamic Hashing Comparison of Ordered Indexing and Hashing Index Definition in SQL

More information

2. Graphical Transformations of Functions

2. Graphical Transformations of Functions 2. Graphical Transformations of Functions In this section we will discuss how the graph of a function may be transformed either by shifting, stretching or compressing, or reflection. In this section let

More information

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. Algebra Midterm Review Packet # Name MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. Write the set. ) E is the set of odd natural numbers between

More information

2.0 Trigonometry Review Date: Pythagorean Theorem: where c is always the.

2.0 Trigonometry Review Date: Pythagorean Theorem: where c is always the. 2.0 Trigonometry Review Date: Key Ideas: The three angles in a triangle sum to. Pythagorean Theorem: where c is always the. In trigonometry problems, all vertices (corners or angles) of the triangle are

More information

A Scalable Content- Addressable Network

A Scalable Content- Addressable Network A Scalable Content- Addressable Network In Proceedings of ACM SIGCOMM 2001 S. Ratnasamy, P. Francis, M. Handley, R. Karp, S. Shenker Presented by L.G. Alex Sung 9th March 2005 for CS856 1 Outline CAN basics

More information

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 1, FEBRUARY

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 1, FEBRUARY IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 1, FEBRUARY 2010 27 On Suitability of Euclidean Embedding for Host-Based Network Coordinate Systems Sanghwan Lee, Zhi-Li Zhang, Member, IEEE, Sambit Sahu,

More information

Topologically-Aware Overlay Construction and Server Selection

Topologically-Aware Overlay Construction and Server Selection Topologically-Aware Overlay Construction and Server Selection Sylvia Ratnasamy, Mark Handley, Richard Karp, Scott Shenker Abstract A number of large-scale distributed Internet applications could potentially

More information

Surface Simplification Using Quadric Error Metrics

Surface Simplification Using Quadric Error Metrics Surface Simplification Using Quadric Error Metrics Authors: Michael Garland & Paul Heckbert Presented by: Niu Xiaozhen Disclaimer: Some slides are modified from original slides, which were designed by

More information

VEEAM. Accelerating virtual machine replication with PORTrockIT

VEEAM. Accelerating virtual machine replication with PORTrockIT VEEAM Accelerating virtual machine replication with PORTrockIT EXECUTIVE SUMMARY Business continuity solutions such as Veeam offer the ability to recover quickly from disaster by creating a replica of

More information

Chapter 4: network layer. Network service model. Two key network-layer functions. Network layer. Input port functions. Router architecture overview

Chapter 4: network layer. Network service model. Two key network-layer functions. Network layer. Input port functions. Router architecture overview Chapter 4: chapter goals: understand principles behind services service models forwarding versus routing how a router works generalized forwarding instantiation, implementation in the Internet 4- Network

More information

Attacks on Phoenix: A Virtual Coordinate System

Attacks on Phoenix: A Virtual Coordinate System Attacks on Phoenix: A Virtual Coordinate System Manpreet Kaur manpreet.7467@gmail.com Lovely Professional University Jalandhar (Punjab) Abstract Many large-scale internet application take use of network

More information

BGP Case Studies. ISP Workshops

BGP Case Studies. ISP Workshops BGP Case Studies ISP Workshops These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/) Last updated

More information

Forces acting on a lamina

Forces acting on a lamina Forces acting on a lamina This example considers the net effect of a number of forces acting on an extended body and can be used to show the concept moments. It is designed to follow on from Forces acting

More information

Simulation in Computer Graphics. Deformable Objects. Matthias Teschner. Computer Science Department University of Freiburg

Simulation in Computer Graphics. Deformable Objects. Matthias Teschner. Computer Science Department University of Freiburg Simulation in Computer Graphics Deformable Objects Matthias Teschner Computer Science Department University of Freiburg Outline introduction forces performance collision handling visualization University

More information

How Routing Algorithms Work

How Routing Algorithms Work How Routing Algorithms Work A router is used to manage network traffic and find the best route for sending packets. But have you ever thought about how routers do this? Routers need to have some information

More information

CS244a: An Introduction to Computer Networks

CS244a: An Introduction to Computer Networks Do not write in this box MCQ 9: /10 10: /10 11: /20 12: /20 13: /20 14: /20 Total: Name: Student ID #: CS244a Winter 2003 Professor McKeown Campus/SITN-Local/SITN-Remote? CS244a: An Introduction to Computer

More information

Internet Traffic Classification using Machine Learning

Internet Traffic Classification using Machine Learning Internet Traffic Classification using Machine Learning by Alina Lapina 2018, UiO, INF5050 Alina Lapina, Master student at IFI, Full stack developer at Ciber Experis 2 Based on Thuy T. T. Nguyen, Grenville

More information

CHAPTER 6 SOLUTION TO NETWORK TRAFFIC PROBLEM IN MIGRATING PARALLEL CRAWLERS USING FUZZY LOGIC

CHAPTER 6 SOLUTION TO NETWORK TRAFFIC PROBLEM IN MIGRATING PARALLEL CRAWLERS USING FUZZY LOGIC CHAPTER 6 SOLUTION TO NETWORK TRAFFIC PROBLEM IN MIGRATING PARALLEL CRAWLERS USING FUZZY LOGIC 6.1 Introduction The properties of the Internet that make web crawling challenging are its large amount of

More information

Improving Prediction Accuracy of Matrix Factorization Based Network Coordinate Systems

Improving Prediction Accuracy of Matrix Factorization Based Network Coordinate Systems Improving Prediction Accuracy of Matrix Factorization Based Network Coordinate Systems Yang Chen,PengSun 2, Xiaoming Fu, Tianyin Xu,3 Institute of Computer Science, University of Goettingen, Germany 2

More information

The Question papers will be structured according to the weighting shown in the table below.

The Question papers will be structured according to the weighting shown in the table below. 3. Time and Mark allocation The Question papers will be structured according to the weighting shown in the table below. DESCRIPTION Question Paper 1: Grade 12: Book work, e.g. proofs of formulae (Maximum

More information

This blog addresses the question: how do we determine the intersection of two circles in the Cartesian plane?

This blog addresses the question: how do we determine the intersection of two circles in the Cartesian plane? Intersecting Circles This blog addresses the question: how do we determine the intersection of two circles in the Cartesian plane? This is a problem that a programmer might have to solve, for example,

More information

MATHEMATICS DEPARTMENT COURSE OUTLINE TERM 1/2/3 YEAR 7

MATHEMATICS DEPARTMENT COURSE OUTLINE TERM 1/2/3 YEAR 7 MATHEMATICS DEPARTMENT COURSE OUTLINE 2016-17 TERM 1/2/3 YEAR 7 Week Topic YEAR 7- Mathematics Term 1 plan 2016-2017 Learning outcomes 1/2 Numbers and the number system Recall prime numbers up to 50 Know

More information

Overlay and P2P Networks. Introduction and unstructured networks. Prof. Sasu Tarkoma

Overlay and P2P Networks. Introduction and unstructured networks. Prof. Sasu Tarkoma Overlay and P2P Networks Introduction and unstructured networks Prof. Sasu Tarkoma 14.1.2013 Contents Overlay networks and intro to networking Unstructured networks Overlay Networks An overlay network

More information

IMMACULATE CONCEPTION BOYS HIGH SCHOOL-MUKUYU FORM THREE MATHEMATICS EXAM 1 TERM

IMMACULATE CONCEPTION BOYS HIGH SCHOOL-MUKUYU FORM THREE MATHEMATICS EXAM 1 TERM IMMACULATE CONCEPTION BOYS HIGH SCHOOL-MUKUYU FORM THREE MATHEMATICS EXAM 1 TERM 1 2018 NAME ADM NO..CLASS. SECTION I (50 MARKS) Answer all questions 1. Simplify without using a calculator 3 1 3 22 3 15

More information

Distributed Core Multicast (DCM): a multicast routing protocol for many groups with few receivers

Distributed Core Multicast (DCM): a multicast routing protocol for many groups with few receivers Distributed Core Multicast (DCM): a multicast routing protocol for many groups with few receivers Ljubica Blazević Jean-Yves Le Boudec Institute for computer Communications and Applications (ICA) Swiss

More information

A Distributed Web Cache using Load-Aware Network Coordinates

A Distributed Web Cache using Load-Aware Network Coordinates A Distributed Web Cache using Load-Aware Network Coordinates Nicholas Ball Department of Computing Imperial College, London Supervisor: Peter Pietzuch Second Marker: Alexander L. Wolf June 17, 2008 Abstract

More information

Copyright 2004 OCCAID. All rights reserved.

Copyright 2004 OCCAID. All rights reserved. Copyright 2004 OCCAID. All rights reserved. Basic overview of OCCAID (who we are and what we are doing with IPv6..). Today s problem with the IPv6 internet. OCCAID s approach to IPv6 BGP Policies OCCAID

More information

Improving Search In Peer-to-Peer Systems

Improving Search In Peer-to-Peer Systems Improving Search In Peer-to-Peer Systems Presented By Jon Hess cs294-4 Fall 2003 Goals Present alternative searching methods for systems with loose integrity constraints Probabilistically optimize over

More information

EECS 122: Introduction to Communication Networks Final Exam Solutions

EECS 122: Introduction to Communication Networks Final Exam Solutions EECS 22: Introduction to Communication Networks Final Exam Solutions Problem. (6 points) How long does it take for a 3000-byte IP packet to go from host A to host B in the figure below. Assume the overhead

More information

Cost Models for Query Processing Strategies in the Active Data Repository

Cost Models for Query Processing Strategies in the Active Data Repository Cost Models for Query rocessing Strategies in the Active Data Repository Chialin Chang Institute for Advanced Computer Studies and Department of Computer Science University of Maryland, College ark 272

More information